Loading ...

Play interactive tourEdit tour

Windows Analysis Report 039846H0INVOICERECEIPT.exe

Overview

General Information

Sample Name:039846H0INVOICERECEIPT.exe
Analysis ID:551967
MD5:3ba78ed2e621b7bb47778ec2567df223
SHA1:d735536d9984db49348e636d13ca0779d76b5d11
SHA256:329def14e6fa2aa0786df6501894efe890f27d250160397a16740a0bc731e967
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Detected unpacking (creates a PE file in dynamic memory)
Initial sample is a PE file and has a suspicious name
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • 039846H0INVOICERECEIPT.exe (PID: 5220 cmdline: "C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe" MD5: 3BA78ED2E621B7BB47778EC2567DF223)
    • 039846H0INVOICERECEIPT.exe (PID: 4396 cmdline: "C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe" MD5: 3BA78ED2E621B7BB47778EC2567DF223)
  • anlq.exe (PID: 3224 cmdline: "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe" MD5: 3BA78ED2E621B7BB47778EC2567DF223)
    • anlq.exe (PID: 6196 cmdline: "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe" MD5: 3BA78ED2E621B7BB47778EC2567DF223)
  • anlq.exe (PID: 6332 cmdline: "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe" MD5: 3BA78ED2E621B7BB47778EC2567DF223)
    • anlq.exe (PID: 6392 cmdline: "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe" MD5: 3BA78ED2E621B7BB47778EC2567DF223)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c6aea8ec-42ab-4933-970f-cf8fecc5", "Group": "", "Domain1": "girlhomejan6100.duckdns.org", "Domain2": "girlhomejan6100.duckdns.org", "Port": 6100, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x111e5:$x1: NanoCore.ClientPluginHost
  • 0x11222:$x2: IClientNetworkHost
  • 0x14d55:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x10f4d:$a: NanoCore
    • 0x10f5d:$a: NanoCore
    • 0x11191:$a: NanoCore
    • 0x111a5:$a: NanoCore
    • 0x111e5:$a: NanoCore
    • 0x10fac:$b: ClientPlugin
    • 0x111ae:$b: ClientPlugin
    • 0x111ee:$b: ClientPlugin
    • 0x110d3:$c: ProjectData
    • 0x11ada:$d: DESCrypto
    • 0x194a6:$e: KeepAlive
    • 0x17494:$g: LogClientMessage
    • 0x1368f:$i: get_Connected
    • 0x11e10:$j: #=q
    • 0x11e40:$j: #=q
    • 0x11e5c:$j: #=q
    • 0x11e8c:$j: #=q
    • 0x11ea8:$j: #=q
    • 0x11ec4:$j: #=q
    • 0x11ef4:$j: #=q
    • 0x11f10:$j: #=q
    00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x7601:$a: NanoCore
      • 0x765a:$a: NanoCore
      • 0x7697:$a: NanoCore
      • 0x7710:$a: NanoCore
      • 0x1adbb:$a: NanoCore
      • 0x1add0:$a: NanoCore
      • 0x1ae05:$a: NanoCore
      • 0x24c69:$a: NanoCore
      • 0x24cc2:$a: NanoCore
      • 0x24cff:$a: NanoCore
      • 0x24d78:$a: NanoCore
      • 0x38423:$a: NanoCore
      • 0x38438:$a: NanoCore
      • 0x3846d:$a: NanoCore
      • 0x46082:$a: NanoCore
      • 0x460a7:$a: NanoCore
      • 0x46100:$a: NanoCore
      • 0x7663:$b: ClientPlugin
      • 0x76a0:$b: ClientPlugin
      • 0x7f9e:$b: ClientPlugin
      • 0x7fab:$b: ClientPlugin
      Click to see the 104 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.2.039846H0INVOICERECEIPT.exe.38e1aec.12.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x10937:$x1: NanoCore.ClientPluginHost
      • 0x10951:$x2: IClientNetworkHost
      1.2.039846H0INVOICERECEIPT.exe.38e1aec.12.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x10937:$x2: NanoCore.ClientPluginHost
      • 0x13c74:$s4: PipeCreated
      • 0x10924:$s5: IClientLoggingHost
      0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe38d:$x1: NanoCore.ClientPluginHost
      • 0xe3ca:$x2: IClientNetworkHost
      • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe105:$x1: NanoCore Client.exe
      • 0xe38d:$x2: NanoCore.ClientPluginHost
      • 0xf9c6:$s1: PluginCommand
      • 0xf9ba:$s2: FileCommand
      • 0x1086b:$s3: PipeExists
      • 0x16622:$s4: PipeCreated
      • 0xe3b7:$s5: IClientLoggingHost
      0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 412 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe, ProcessId: 4396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe, ProcessId: 4396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe, ProcessId: 4396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe, ProcessId: 4396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000001.00000002.508341763.0000000003962000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c6aea8ec-42ab-4933-970f-cf8fecc5", "Group": "", "Domain1": "girlhomejan6100.duckdns.org", "Domain2": "girlhomejan6100.duckdns.org", "Port": 6100, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeReversingLabs: Detection: 32%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508341763.0000000003962000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTR
        Source: 11.0.anlq.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.anlq.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 0.2.039846H0INVOICERECEIPT.exe.31f0000.4.unpackAvira: Label: TR/Patched.Ren.Gen
        Source: 11.0.anlq.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.anlq.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.2.anlq.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.anlq.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.anlq.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.anlq.exe.22e0000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.1.anlq.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.anlq.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.0.anlq.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 11.2.anlq.exe.2650000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.anlq.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Detected unpacking (creates a PE file in dynamic memory)Show sources
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeUnpacked PE file: 11.2.anlq.exe.2650000.4.unpack
        Source: 039846H0INVOICERECEIPT.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: wntdll.pdbUGP source: 039846H0INVOICERECEIPT.exe, 00000000.00000003.238769335.0000000003460000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000000.00000003.233449853.00000000035F0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.271625627.00000000031C0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.277128619.0000000003350000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.296454332.0000000003490000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.291267046.0000000003300000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: 039846H0INVOICERECEIPT.exe, 00000000.00000003.238769335.0000000003460000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000000.00000003.233449853.00000000035F0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.271625627.00000000031C0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.277128619.0000000003350000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.296454332.0000000003490000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.291267046.0000000003300000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.pdbF source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.500151835.000000000070D000.00000004.00000020.sdmp
        Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: System.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504112483.0000000002587000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504112483.0000000002587000.00000004.00000040.sdmp
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00402630 FindFirstFileA,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_00402630 FindFirstFileA,

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: girlhomejan6100.duckdns.org
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: girlhomejan6100.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.5:49754 -> 194.5.98.28:6100
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: http://google.com
        Source: anlq.exe, anlq.exe, 00000009.00000002.297239480.0000000000409000.00000004.00020000.sdmp, anlq.exe, 00000009.00000000.275568008.0000000000409000.00000008.00020000.sdmp, anlq.exe, 0000000B.00000000.280633346.0000000000409000.00000008.00020000.sdmp, 039846H0INVOICERECEIPT.exe, anlq.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: 039846H0INVOICERECEIPT.exe, anlq.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: unknownDNS traffic detected: queries for: girlhomejan6100.duckdns.org
        Source: 039846H0INVOICERECEIPT.exe, 00000000.00000002.248356009.000000000080A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508341763.0000000003962000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 1.2.039846H0INVOICERECEIPT.exe.38e1aec.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d3248.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2975790.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2975790.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d7ee7.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.28e156c.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2aad308.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2aad308.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.anlq.exe.27968bc.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.2a768bc.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d3248.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292734330.000000000277E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.314490678.0000000002A5E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 1.2.039846H0INVOICERECEIPT.exe.38e1aec.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.38e1aec.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d3248.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d3248.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2975790.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2975790.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d7ee7.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d7ee7.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.28e156c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.28e156c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2aad308.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2aad308.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.2aad308.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.anlq.exe.27968bc.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.anlq.exe.27968bc.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.2a768bc.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.2a768bc.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2961128.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a98c84.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d3248.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.38d3248.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2954eb4.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.039846H0INVOICERECEIPT.exe.2a8c9f4.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292734330.000000000277E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.314490678.0000000002A5E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_0040604C
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00404772
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F756F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F697A
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F9374
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F674D
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6F59
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6553
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8751
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8D3A
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F9139
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6117
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F4FFA
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8DF4
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F81F3
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F91F2
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F1FC6
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F81AB
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F87A8
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F51A2
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F93BF
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F67B8
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F758F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F698E
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8F8E
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F619E
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6599
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F7596
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F946A
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F9063
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6676
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F9045
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8A2F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F4E3F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F583F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F5839
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F7A03
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8EFF
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F92F9
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F1ADD
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F76D2
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F92A4
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F8EB3
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F704E91
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F708C94
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6886
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F7A82
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F7E9A
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0040A2A5
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_025323A0
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_02532FA8
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_02538468
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_02539068
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0253ACC8
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0253306F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_02539910
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0253912F
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_1_0040A2A5
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF381F3
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF391F2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38DF4
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF34FFA
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF31FC6
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF367B8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF393BF
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF351A2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF381AB
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF387A8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF37596
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36599
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3619E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3758F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3698E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38F8E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF39374
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3697A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3756F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36553
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38751
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36F59
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3674D
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38D3A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF39139
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36117
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF392F9
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38EFF
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF376D2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF31ADD
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38EB3
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF392A4
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF48C94
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF44E91
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF37E9A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF37A82
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36886
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36676
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF39063
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3946A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF39045
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF35839
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF34E3F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF3583F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF38A2F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF37A03
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_0040A2A5
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_02320879
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_023207B1
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_048A2FA8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_048A23A0
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_048A3850
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_048A306F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_0040A2A5
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_0040604C
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_00404772
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B7EC
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE54FFA
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE51FC6
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5AFC2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE587A8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5ABA8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5C3A8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE593BF
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE567B8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58F8E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE59374
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5674D
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58751
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56F59
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B305
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5BB19
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58EFF
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE592F9
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5BAF8
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B6CD
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE576D2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE51ADD
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5AEDB
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE592A4
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5BAAA
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58EB3
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE57A82
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B694
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5AE91
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE64E91
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE57E9A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56676
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5BA7A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5D24C
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58A2F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5AE34
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE54E3F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE57A03
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5ADED
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58DF4
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE581F3
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE591F2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE551A2
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE581AB
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B9B0
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B5BB
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5758F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5698E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE57596
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5AD92
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5619E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56599
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5756F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B579
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5697A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B943
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56553
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE59139
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE58D3A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56117
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5CD1C
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B11A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B0EC
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56886
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE68C94
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5B09E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE59063
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5946A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE59045
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5BC5E
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5583F
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE55839
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5BC1A
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: String function: 00401ED0 appears 46 times
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: String function: 0040569E appears 36 times
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: String function: 00401ED0 appears 46 times
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: String function: 0040569E appears 36 times
        Source: 039846H0INVOICERECEIPT.exe, 00000000.00000003.238949634.0000000003576000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000000.00000003.242193895.000000000370F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508259878.00000000038D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508259878.00000000038D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508259878.00000000038D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 039846H0INVOICERECEIPT.exe
        Source: 039846H0INVOICERECEIPT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: anlq.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile read: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeJump to behavior
        Source: 039846H0INVOICERECEIPT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe "C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe"
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess created: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe "C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe"
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess created: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe "C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe"
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile created: C:\Users\user\AppData\Roaming\ngneqippkvJump to behavior
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile created: C:\Users\user\AppData\Local\Temp\nsa26E.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/12@19/1
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c6aea8ec-42ab-4933-970f-cf8fecc5c7fd}
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: wntdll.pdbUGP source: 039846H0INVOICERECEIPT.exe, 00000000.00000003.238769335.0000000003460000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000000.00000003.233449853.00000000035F0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.271625627.00000000031C0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.277128619.0000000003350000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.296454332.0000000003490000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.291267046.0000000003300000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: 039846H0INVOICERECEIPT.exe, 00000000.00000003.238769335.0000000003460000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000000.00000003.233449853.00000000035F0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.271625627.00000000031C0000.00000004.00000001.sdmp, anlq.exe, 00000005.00000003.277128619.0000000003350000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.296454332.0000000003490000.00000004.00000001.sdmp, anlq.exe, 00000009.00000003.291267046.0000000003300000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.pdbF source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.500151835.000000000070D000.00000004.00000020.sdmp
        Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: System.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504112483.0000000002587000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp
        Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504112483.0000000002587000.00000004.00000040.sdmp

        Data Obfuscation:

        barindex
        Detected unpacking (creates a PE file in dynamic memory)Show sources
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeUnpacked PE file: 11.2.anlq.exe.2650000.4.unpack
        .NET source code contains potential unpackerShow sources
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F6FD2 pushfd ; iretd
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_6F6F4E8F pushad ; retf 0000h
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00401F16 push ecx; ret
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_1_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF36FD2 pushfd ; iretd
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_6FF34E8F pushad ; retf 0000h
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00932C95 push cs; ret
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00932934 push esi; ret
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE56FD2 pushfd ; iretd
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE54E8F pushad ; retf 0000h
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_6FE5C231 pushfd ; retf
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.2.anlq.exe.22e0000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 11.2.anlq.exe.2650000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile created: C:\Users\user\AppData\Local\Temp\nsa270.tmp\xhkkjvbj.dllJump to dropped file
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeFile created: C:\Users\user\AppData\Local\Temp\nsv59F7.tmp\xhkkjvbj.dllJump to dropped file
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeFile created: C:\Users\user\AppData\Local\Temp\nsn3AA7.tmp\xhkkjvbj.dllJump to dropped file
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run pvlmhsolmsJump to behavior
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run pvlmhsolmsJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeFile opened: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe TID: 5044Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe TID: 6112Thread sleep time: -640000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe TID: 5852Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe TID: 6372Thread sleep count: 42 > 30
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe TID: 6368Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe TID: 6336Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe TID: 6280Thread sleep count: 38 > 30
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe TID: 1692Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeWindow / User API: threadDelayed 389
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeWindow / User API: foregroundWindowGot 953
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00402630 FindFirstFileA,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_00402630 FindFirstFileA,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeAPI call chain: ExitProcess graph end node
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000003.291641491.000000000070D000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.500151835.000000000070D000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(!
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_004067FE GetProcessHeap,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_0019E213 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_0019E252 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_0019E290 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_0019DF4E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_0019E162 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_1_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_0019E213 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_0019E252 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_0019E290 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_0019DF4E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 5_2_0019E162 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_0019E213 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_0019E252 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_0019E290 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_0019DF4E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 9_2_0019E162 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_1_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeCode function: 7_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeMemory written: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeMemory written: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeMemory written: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeProcess created: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe "C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe"
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exeProcess created: C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe "C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.500044885.0000000000700000.00000004.00000020.sdmpBinary or memory string: Program Manager/y
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpBinary or memory string: Program Manager|9(r
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508218861.0000000002B6B000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.508241086.0000000002B74000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507762336.0000000002A43000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.508145898.0000000002B44000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507737828.0000000002A39000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507838205.0000000002A77000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507800619.0000000002A55000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.508190218.0000000002B61000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.501683342.0000000000E30000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.501683342.0000000000E30000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.501683342.0000000000E30000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508145898.0000000002B44000.00000004.00000001.sdmpBinary or memory string: Program Manager</(r
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507838205.0000000002A77000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507800619.0000000002A55000.00000004.00000001.sdmpBinary or memory string: Program Manager8
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.501683342.0000000000E30000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.501683342.0000000000E30000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_0040208D cpuid
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 1_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
        Source: C:\Users\user\Desktop\039846H0INVOICERECEIPT.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508341763.0000000003962000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: 039846H0INVOICERECEIPT.exe, 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.508259878.00000000038D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 039846H0INVOICERECEIPT.exe, 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: anlq.exe, 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292734330.000000000277E000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292734330.000000000277E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: anlq.exe, 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: anlq.exe, 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 0000000B.00000002.314490678.0000000002A5E000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 0000000B.00000002.314490678.0000000002A5E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: anlq.exe, 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: anlq.exe, 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: anlq.exe, 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad5495.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31b1458.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3ad0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390a822.15.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3a53258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.3acc036.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.396df79.18.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f5495.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.6318c8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.22e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37f0e6c.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.37ec036.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.anlq.exe.3773258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.518e30.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3913c81.17.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2481458.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3171458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.039846H0INVOICERECEIPT.exe.31a0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.390f658.16.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.3969950.19.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.400000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.6837e8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.0.anlq.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.anlq.exe.3160000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2650000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.anlq.exe.2470000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.039846H0INVOICERECEIPT.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.anlq.exe.2610000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.anlq.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.anlq.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.508341763.0000000003962000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 5220, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: 039846H0INVOICERECEIPT.exe PID: 4396, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 3224, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6196, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: anlq.exe PID: 6392, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsNative API1Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1Input Capture21System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information11LSASS MemoryFile and Directory Discovery2Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery15SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing21NTDSSecurity Software Discovery121Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsVirtualization/Sandbox Evasion21VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 551967 Sample: 039846H0INVOICERECEIPT.exe Startdate: 12/01/2022 Architecture: WINDOWS Score: 100 36 girlhomejan6100.duckdns.org 2->36 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Sigma detected: NanoCore 2->44 46 6 other signatures 2->46 7 anlq.exe 17 2->7         started        11 039846H0INVOICERECEIPT.exe 1 21 2->11         started        13 anlq.exe 17 2->13         started        signatures3 process4 file5 24 C:\Users\user\AppData\Local\...\xhkkjvbj.dll, PE32 7->24 dropped 50 Multi AV Scanner detection for dropped file 7->50 52 Detected unpacking (creates a PE file in dynamic memory) 7->52 54 Injects a PE file into a foreign processes 7->54 15 anlq.exe 3 7->15         started        26 C:\Users\user\AppData\Roaming\...\anlq.exe, PE32 11->26 dropped 28 C:\Users\user\AppData\Local\...\xhkkjvbj.dll, PE32 11->28 dropped 18 039846H0INVOICERECEIPT.exe 9 11->18         started        30 C:\Users\user\AppData\Local\...\xhkkjvbj.dll, PE32 13->30 dropped 22 anlq.exe 2 13->22         started        signatures6 process7 dnsIp8 32 C:\Users\user\AppData\Local\...\anlq.exe.log, ASCII 15->32 dropped 38 girlhomejan6100.duckdns.org 194.5.98.28, 49754, 49758, 49760 DANILENKODE Netherlands 18->38 34 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 18->34 dropped 48 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->48 file9 signatures10

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe33%ReversingLabsWin32.Backdoor.NanoBot

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        11.0.anlq.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.anlq.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        0.2.039846H0INVOICERECEIPT.exe.31f0000.4.unpack100%AviraTR/Patched.Ren.GenDownload File
        11.0.anlq.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.anlq.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.2.anlq.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.039846H0INVOICERECEIPT.exe.24e0000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.anlq.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.anlq.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.anlq.exe.22e0000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.1.anlq.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.anlq.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.039846H0INVOICERECEIPT.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.0.anlq.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        11.2.anlq.exe.2650000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.anlq.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.0.039846H0INVOICERECEIPT.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        girlhomejan6100.duckdns.org0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        girlhomejan6100.duckdns.org
        194.5.98.28
        truefalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          girlhomejan6100.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://nsis.sf.net/NSIS_Erroranlq.exe, anlq.exe, 00000009.00000002.297239480.0000000000409000.00000004.00020000.sdmp, anlq.exe, 00000009.00000000.275568008.0000000000409000.00000008.00020000.sdmp, anlq.exe, 0000000B.00000000.280633346.0000000000409000.00000008.00020000.sdmp, 039846H0INVOICERECEIPT.exe, anlq.exe.0.drfalse
            high
            http://nsis.sf.net/NSIS_ErrorError039846H0INVOICERECEIPT.exe, anlq.exe.0.drfalse
              high
              http://google.com039846H0INVOICERECEIPT.exe, 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, 039846H0INVOICERECEIPT.exe, 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                194.5.98.28
                girlhomejan6100.duckdns.orgNetherlands
                208476DANILENKODEfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:551967
                Start date:12.01.2022
                Start time:18:37:12
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 13m 15s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:039846H0INVOICERECEIPT.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:31
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@9/12@19/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 49.3% (good quality ratio 44.7%)
                • Quality average: 75.3%
                • Quality standard deviation: 32.6%
                HCA Information:
                • Successful, ratio: 89%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                • TCP Packets have been reduced to 100
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, dual-a-0001.dc-msedge.net, client.wns.windows.com, fs.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                18:38:07AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run pvlmhsolms C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                18:38:13API Interceptor919x Sleep call for process: 039846H0INVOICERECEIPT.exe modified
                18:38:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run pvlmhsolms C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                18:38:19API Interceptor2x Sleep call for process: anlq.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\anlq.exe.log
                Process:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):525
                Entropy (8bit):5.2874233355119316
                Encrypted:false
                SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                MD5:61CCF53571C9ABA6511D696CB0D32E45
                SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                Malicious:true
                Reputation:unknown
                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                C:\Users\user\AppData\Local\Temp\hrggihx
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:data
                Category:dropped
                Size (bytes):7272
                Entropy (8bit):6.09209206442148
                Encrypted:false
                SSDEEP:192:8kkYa0Nt5QUVWRwieW9MUAaEv5dkuugi16h:KYIRwIdAb5dkuuVA
                MD5:84AF91836496FCF1039B4EF1849BCCCC
                SHA1:6AAFD320AE47429F68E325060D816F8055510269
                SHA-256:3048FF8B8E6228D2AFFC852697C81DF5FC8CF44FBC63AC3592F199334F592FAE
                SHA-512:7BEA193F17D21BA3A63A3010DFE8C09E4B45E9C846ED8FD1106342BCE7FCC89DEEBE9F8BD03FDF41F5D9D7EFF4516D61D1F9515B5B289E0F18B62D3B9687BB96
                Malicious:false
                Reputation:unknown
                Preview: ..~}},...="+....}.....b<......b<....}.<.e}}}...}.....m.<.-..}}}.<..,......m.<.-..}}}.<..,......m.<.-..}}}.<..,......m.<.-..}}}.<..,...my.W'.5..rr<...<..,..<m.yB..<..D..<..D..y.B.'m8...<.r,..y..<..+....'B.}}}}.yY|.Z.....8...7...@5...@8...6...3...m.E....E.A.]......@7.<..|.<.r...}}}}.9YyR}}}.yY.....36.<.63*..4..},..00.....b<..<..}J<..].<..}.Dm.i..,..9.y.<..<..}=.D....<..,...4..}%k......}}.#.}}.i}%.......}}.1.}}..}%.1...).}}.G.}}..},...e.....b<..<.m}}}.<..<....}.k.<..}}.<.=.<..<.E.<....i|}}...;.<..'.8..}.9...)...<..'.8..}.9...)..'.'.5..}.9|.-%.......}}-.....<....<.-....G....<....}.{...}.~.<..}}}.<...4.y},...=.....b<..<.e}}}.<..<....}.k.<..}}.<.=.<..<.E.<.....y}}.....}}}.<..'.8..}.9...)...<..'.8..}.9...)...<m.'.8...9...)...<iB.'.7..r.9l..Al..<..'.8....9...)..'|'.5..}.9|.-%k.....}}}-......<...u}...<..Du...n..u..i..m.......N....<....}.{...}.~.<..}}}.<...4.i},...q.<.m}}}.<..<....}.k.<..}}.<.=.<..<.E.<....'r}}...;.<..'.8..}.9...)...<..'.8..}.9...)..'.'.5..}.9|.-%.1...^}}}-.Y....<.....
                C:\Users\user\AppData\Local\Temp\lbzyziajixj
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:data
                Category:dropped
                Size (bytes):278527
                Entropy (8bit):7.98626113376592
                Encrypted:false
                SSDEEP:6144:EVfOvppvVrqXcEI6r/dlwsH0L+lBzusPxqeaz0Q/uZy07iF0O:EUvpeXcbRLsBzuSQj0Q21GF0O
                MD5:1A877E28204D5F93FA7C6741EF0388A5
                SHA1:FD6AFFA1F9A8C1A0D5FDDE565A45B83083A20F51
                SHA-256:53021B4269BB956F3FC824666A1C064B359038E4148C4C3FED3BF00C5BC8AFA4
                SHA-512:1E38B92109EFE988EB1109806C3DC78C35FDFA05601874F6621B1AA789CE67C131981D2C2E4F0C0301BA1C901638AB90EE5B23F9917161480FAF79111C432EA3
                Malicious:false
                Reputation:unknown
                Preview: ....(<[a-..^..I.2.:%x..+..].......C.\.J.L...qr..w.9.'..% ..k.*.fA...$og.u.%.?.Y[.....Y...`..l...gC!.DXBB?..J..%.p..F...}j.........z|]6...'.$...........e.0hdeI.6.?.|.....E....!..zg.K;1.@Y..T..L....Dp..I.>.o.....Z.Ts.|..0.vq..y.....D...&.Jv..6K.a<[a8?.^...]...x..N....(.$.CQ\.J.....qn|.w...'..% .2.y.^... v|...`-\..X...v'.F...........V.*m.e,h..;....N....j...........~..........b..YD.3..#.9..,...#.#dj..h.....#."....R..0........%3w..|(.x..+V...Rt1....6...H.v6..M.D.H.......7...&.Jv.Z#.|.<[a.N.^..I...:%x..N..].......&.\.n.Z.:".q.>.w...'..% ..k.yP^... v....`-5....v'.22........O8..V..m.d,h....9..n./.........qv....~'W.........b..YD.3....\I.,....#dc-....#.."....R..0..a..'..%3w..|J....+V...Rt1......./..v6..M.D.H.......7...&.Jv..6K.a<[a...^.kI...:%x..N..].......C.\.J.L...qr..w.9.'..% .2k.yP^... v....`-\j....v'.2.........O...V..m.d,h........N...}j...........~'.........b..YD.3..#.9..,...#.#dj../....#."....R..0........%3w..|J....+V...Rt1......./..v
                C:\Users\user\AppData\Local\Temp\nsa26F.tmp
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:data
                Category:dropped
                Size (bytes):512250
                Entropy (8bit):7.256628469673656
                Encrypted:false
                SSDEEP:12288:oUvpeXcbRLsBzuSQj0Q21GF06nCYFD6TG9pjni6v:BRalzC03AFNTACLv
                MD5:034F48DF0C0D4EE3A38B94F6DA5C1AC0
                SHA1:A58C49CC5CBD163FF1761694925F0456710BBDBA
                SHA-256:4D8989CEF3C0C56870D6155502AE3502A7AA8A0CB1710CEEF3CE90DED224CA24
                SHA-512:6E96F7D84FA31F4AD7262E781262AD4309B3EFB16609A5932449D0F300B7277780A66FD4F7D291E99AEFA557DAF3F2DB2B24E535DB53C854B8E7D789C77C817F
                Malicious:false
                Reputation:unknown
                Preview: .j......,...................|...lO.......i......kj..............................................................'...........................................................................................................................................................................J...............!...j...........................................................................................................................................?...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\nsa270.tmp\xhkkjvbj.dll
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):199168
                Entropy (8bit):5.816916948044661
                Encrypted:false
                SSDEEP:6144:SUtJEr7mQNzZ/vDXqxnfNahvFp1cck4X3rm6v:SnCYFD6TG9pjni6v
                MD5:4ABDC13A9B62E3DA21D83E864F3B865F
                SHA1:7892B7FA56E730DE7E08F23E5808DFB915C1FF23
                SHA-256:E3A428A341B65CC607F5C48109502B3D1DACEA9275F0471FE451EC06DFD8B0A4
                SHA-512:413B53E7427F5132C92FC3ECB0AF329334C285E3D0244D61A50764FB53A642151FD2FA214EDAFC1CC3703D22D97CC8A4DEB997005E3EBE52541D9DE74E39E97D
                Malicious:false
                Reputation:unknown
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,...B...B...B.......B..C...B...C...B.a.F...B.a.B...B.d.....B.a.@...B.Rich..B.........PE..L......a...........!.........................................................@............@.......................................... .......................0..x....................................................................................text...K........................... ..`.rdata..............................@..@.rsrc........ ......................@..@.reloc..x....0......................@..B........................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\nsa59C7.tmp
                Process:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                File Type:data
                Category:dropped
                Size (bytes):512250
                Entropy (8bit):7.256628469673656
                Encrypted:false
                SSDEEP:12288:oUvpeXcbRLsBzuSQj0Q21GF06nCYFD6TG9pjni6v:BRalzC03AFNTACLv
                MD5:034F48DF0C0D4EE3A38B94F6DA5C1AC0
                SHA1:A58C49CC5CBD163FF1761694925F0456710BBDBA
                SHA-256:4D8989CEF3C0C56870D6155502AE3502A7AA8A0CB1710CEEF3CE90DED224CA24
                SHA-512:6E96F7D84FA31F4AD7262E781262AD4309B3EFB16609A5932449D0F300B7277780A66FD4F7D291E99AEFA557DAF3F2DB2B24E535DB53C854B8E7D789C77C817F
                Malicious:false
                Reputation:unknown
                Preview: .j......,...................|...lO.......i......kj..............................................................'...........................................................................................................................................................................J...............!...j...........................................................................................................................................?...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\nsn3AA6.tmp
                Process:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                File Type:data
                Category:dropped
                Size (bytes):512250
                Entropy (8bit):7.256628469673656
                Encrypted:false
                SSDEEP:12288:oUvpeXcbRLsBzuSQj0Q21GF06nCYFD6TG9pjni6v:BRalzC03AFNTACLv
                MD5:034F48DF0C0D4EE3A38B94F6DA5C1AC0
                SHA1:A58C49CC5CBD163FF1761694925F0456710BBDBA
                SHA-256:4D8989CEF3C0C56870D6155502AE3502A7AA8A0CB1710CEEF3CE90DED224CA24
                SHA-512:6E96F7D84FA31F4AD7262E781262AD4309B3EFB16609A5932449D0F300B7277780A66FD4F7D291E99AEFA557DAF3F2DB2B24E535DB53C854B8E7D789C77C817F
                Malicious:false
                Reputation:unknown
                Preview: .j......,...................|...lO.......i......kj..............................................................'...........................................................................................................................................................................J...............!...j...........................................................................................................................................?...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\nsn3AA7.tmp\xhkkjvbj.dll
                Process:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):199168
                Entropy (8bit):5.816916948044661
                Encrypted:false
                SSDEEP:6144:SUtJEr7mQNzZ/vDXqxnfNahvFp1cck4X3rm6v:SnCYFD6TG9pjni6v
                MD5:4ABDC13A9B62E3DA21D83E864F3B865F
                SHA1:7892B7FA56E730DE7E08F23E5808DFB915C1FF23
                SHA-256:E3A428A341B65CC607F5C48109502B3D1DACEA9275F0471FE451EC06DFD8B0A4
                SHA-512:413B53E7427F5132C92FC3ECB0AF329334C285E3D0244D61A50764FB53A642151FD2FA214EDAFC1CC3703D22D97CC8A4DEB997005E3EBE52541D9DE74E39E97D
                Malicious:false
                Reputation:unknown
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,...B...B...B.......B..C...B...C...B.a.F...B.a.B...B.d.....B.a.@...B.Rich..B.........PE..L......a...........!.........................................................@............@.......................................... .......................0..x....................................................................................text...K........................... ..`.rdata..............................@..@.rsrc........ ......................@..@.reloc..x....0......................@..B........................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\nsv59F7.tmp\xhkkjvbj.dll
                Process:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):199168
                Entropy (8bit):5.816916948044661
                Encrypted:false
                SSDEEP:6144:SUtJEr7mQNzZ/vDXqxnfNahvFp1cck4X3rm6v:SnCYFD6TG9pjni6v
                MD5:4ABDC13A9B62E3DA21D83E864F3B865F
                SHA1:7892B7FA56E730DE7E08F23E5808DFB915C1FF23
                SHA-256:E3A428A341B65CC607F5C48109502B3D1DACEA9275F0471FE451EC06DFD8B0A4
                SHA-512:413B53E7427F5132C92FC3ECB0AF329334C285E3D0244D61A50764FB53A642151FD2FA214EDAFC1CC3703D22D97CC8A4DEB997005E3EBE52541D9DE74E39E97D
                Malicious:false
                Reputation:unknown
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,...B...B...B.......B..C...B...C...B.a.F...B.a.B...B.d.....B.a.@...B.Rich..B.........PE..L......a...........!.........................................................@............@.......................................... .......................0..x....................................................................................text...K........................... ..`.rdata..............................@..@.rsrc........ ......................@..@.reloc..x....0......................@..B........................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:data
                Category:dropped
                Size (bytes):232
                Entropy (8bit):7.089541637477408
                Encrypted:false
                SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                Malicious:false
                Reputation:unknown
                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:ISO-8859 text, with no line terminators
                Category:dropped
                Size (bytes):8
                Entropy (8bit):3.0
                Encrypted:false
                SSDEEP:3:Vrbe8:BbR
                MD5:0E68D78A36EF2C6EF8D21982A69E2B8E
                SHA1:D068EAEA77750FBF39FCD3745518AEF1299C923A
                SHA-256:1627BB8E1FA328D1BFAA1E4886DAB9402AC843228F4884FDA87EFDFEB43A19E7
                SHA-512:E617DE5DDB17E673F1B77C9730E33A2360BAD48D66796ED1A539E9F52C14B62F96F8C5E79A1015E4B9A3ACDB48B845845D9F4B5C7FDF4961000270AB8C2DAF04
                Malicious:true
                Reputation:unknown
                Preview: 1i.=..H
                C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                Process:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Category:dropped
                Size (bytes):635846
                Entropy (8bit):7.265896534672954
                Encrypted:false
                SSDEEP:12288:wkelR0/7/mpgcoDrMAJvRZ2/JPv5xEG44LV3M5VQTJ:Fyy/7EMnMAJZZqPRxEUhKY
                MD5:3BA78ED2E621B7BB47778EC2567DF223
                SHA1:D735536D9984DB49348E636D13CA0779D76B5D11
                SHA-256:329DEF14E6FA2AA0786DF6501894EFE890F27D250160397A16740A0BC731E967
                SHA-512:0C7B44ABD55C0EE3BEF28849D1C6660409489FBCC97635273E9E6F61D522529F374D5BD7266FB267B781A29CC863FF90C60CA98ACF13D216EFAC0A99A0100380
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 33%
                Reputation:unknown
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.......p....@..........................0...............................................s...........e...........................................................................p...............................text...vY.......Z.................. ..`.rdata.......p.......^..............@..@.data................p..............@....ndata.......@...........................rsrc....e.......f...t..............@..@........................................................................................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.265896534672954
                TrID:
                • Win32 Executable (generic) a (10002005/4) 92.16%
                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:039846H0INVOICERECEIPT.exe
                File size:635846
                MD5:3ba78ed2e621b7bb47778ec2567df223
                SHA1:d735536d9984db49348e636d13ca0779d76b5d11
                SHA256:329def14e6fa2aa0786df6501894efe890f27d250160397a16740a0bc731e967
                SHA512:0c7b44abd55c0ee3bef28849d1c6660409489fbcc97635273e9e6f61d522529f374d5bd7266fb267b781a29cc863ff90c60ca98acf13d216efac0a99a0100380
                SSDEEP:12288:wkelR0/7/mpgcoDrMAJvRZ2/JPv5xEG44LV3M5VQTJ:Fyy/7EMnMAJZZqPRxEUhKY
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

                File Icon

                Icon Hash:844048d8e119cc10

                Static PE Info

                General

                Entrypoint:0x403225
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:
                Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:099c0646ea7282d232219f8807883be0

                Entrypoint Preview

                Instruction
                sub esp, 00000180h
                push ebx
                push ebp
                push esi
                xor ebx, ebx
                push edi
                mov dword ptr [esp+18h], ebx
                mov dword ptr [esp+10h], 00409128h
                xor esi, esi
                mov byte ptr [esp+14h], 00000020h
                call dword ptr [00407030h]
                push 00008001h
                call dword ptr [004070B4h]
                push ebx
                call dword ptr [0040727Ch]
                push 00000008h
                mov dword ptr [00423F58h], eax
                call 00007F1E206F7570h
                mov dword ptr [00423EA4h], eax
                push ebx
                lea eax, dword ptr [esp+34h]
                push 00000160h
                push eax
                push ebx
                push 0041F450h
                call dword ptr [00407158h]
                push 004091B0h
                push 004236A0h
                call 00007F1E206F7227h
                call dword ptr [004070B0h]
                mov edi, 00429000h
                push eax
                push edi
                call 00007F1E206F7215h
                push ebx
                call dword ptr [0040710Ch]
                cmp byte ptr [00429000h], 00000022h
                mov dword ptr [00423EA0h], eax
                mov eax, edi
                jne 00007F1E206F4A3Ch
                mov byte ptr [esp+14h], 00000022h
                mov eax, 00429001h
                push dword ptr [esp+14h]
                push eax
                call 00007F1E206F6D08h
                push eax
                call dword ptr [0040721Ch]
                mov dword ptr [esp+1Ch], eax
                jmp 00007F1E206F4A95h
                cmp cl, 00000020h
                jne 00007F1E206F4A38h
                inc eax
                cmp byte ptr [eax], 00000020h
                je 00007F1E206F4A2Ch
                cmp byte ptr [eax], 00000022h
                mov byte ptr [eax+eax+00h], 00000000h

                Rich Headers

                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x365a0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x2c0000x365a00x36600False0.536521192529data5.19064157442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x2c3100x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x3cb380xe5d4PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                RT_ICON0x4b1100x94a8dataEnglishUnited States
                RT_ICON0x545b80x5488dataEnglishUnited States
                RT_ICON0x59a400x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                RT_ICON0x5dc680x25a8dataEnglishUnited States
                RT_ICON0x602100x10a8dataEnglishUnited States
                RT_ICON0x612b80x988dataEnglishUnited States
                RT_ICON0x61c400x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                RT_DIALOG0x620a80x100dataEnglishUnited States
                RT_DIALOG0x621a80x11cdataEnglishUnited States
                RT_DIALOG0x622c80x60dataEnglishUnited States
                RT_GROUP_ICON0x623280x84dataEnglishUnited States
                RT_MANIFEST0x623b00x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                Imports

                DLLImport
                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                01/12/22-18:38:14.752086UDP254DNS SPOOF query response with TTL of 1 min. and no authority53654478.8.8.8192.168.2.5
                01/12/22-18:38:21.213359UDP254DNS SPOOF query response with TTL of 1 min. and no authority53524418.8.8.8192.168.2.5
                01/12/22-18:38:26.409181UDP254DNS SPOOF query response with TTL of 1 min. and no authority53595968.8.8.8192.168.2.5
                01/12/22-18:38:44.795475UDP254DNS SPOOF query response with TTL of 1 min. and no authority53569698.8.8.8192.168.2.5
                01/12/22-18:38:50.028428UDP254DNS SPOOF query response with TTL of 1 min. and no authority53551618.8.8.8192.168.2.5
                01/12/22-18:38:55.291504UDP254DNS SPOOF query response with TTL of 1 min. and no authority53550168.8.8.8192.168.2.5
                01/12/22-18:39:08.058603UDP254DNS SPOOF query response with TTL of 1 min. and no authority53504638.8.8.8192.168.2.5
                01/12/22-18:39:13.357094UDP254DNS SPOOF query response with TTL of 1 min. and no authority53503948.8.8.8192.168.2.5
                01/12/22-18:39:28.259863UDP254DNS SPOOF query response with TTL of 1 min. and no authority53564328.8.8.8192.168.2.5
                01/12/22-18:40:07.983394UDP254DNS SPOOF query response with TTL of 1 min. and no authority53571728.8.8.8192.168.2.5

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 12, 2022 18:38:14.762473106 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:14.978729010 CET610049754194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:14.978900909 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:15.008564949 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:15.239233971 CET610049754194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:15.239372969 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:15.493458033 CET610049754194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:15.493607998 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:15.625256062 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:15.710957050 CET610049754194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:15.711081028 CET497546100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:21.215373993 CET497586100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:21.431581020 CET610049758194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:21.431749105 CET497586100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:21.432674885 CET497586100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:21.680238008 CET610049758194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:21.680325985 CET497586100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:21.828057051 CET497586100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:21.896626949 CET610049758194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:21.896743059 CET497586100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:26.412372112 CET497606100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:26.632384062 CET610049760194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:26.632580996 CET497606100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:26.634591103 CET497606100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:26.852159023 CET610049760194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:26.852287054 CET497606100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:27.032744884 CET497606100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:27.068553925 CET610049760194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:27.069087982 CET497606100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:31.673110008 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:31.889451027 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:31.896738052 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:31.954319954 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:32.193931103 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:32.200773001 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:32.477225065 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:32.477319002 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:32.694205999 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:32.694291115 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:32.961419106 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:32.961489916 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.243072033 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.243155956 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.509690046 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.509769917 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.542867899 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.542964935 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.543037891 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.543082952 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.543088913 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.543137074 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.543270111 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.543318987 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.761774063 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.761816978 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.761877060 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.761909008 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.761936903 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.761944056 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.762034893 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.762099028 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.762216091 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.762239933 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.762300014 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.762309074 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.762603998 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.762635946 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.762706041 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.762716055 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.968620062 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.979255915 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.979293108 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.979397058 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.979408026 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.979418993 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.979619980 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.979650021 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.979710102 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.979888916 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.979943991 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.979999065 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980086088 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980108023 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980246067 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980272055 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980293989 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980406046 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980429888 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980631113 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980660915 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980716944 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980725050 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980771065 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980832100 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.980854034 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980966091 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.980966091 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.981010914 CET610049764194.5.98.28192.168.2.5
                Jan 12, 2022 18:38:33.981029987 CET497646100192.168.2.5194.5.98.28
                Jan 12, 2022 18:38:33.981154919 CET497646100192.168.2.5194.5.98.28

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 12, 2022 18:38:14.636555910 CET6544753192.168.2.58.8.8.8
                Jan 12, 2022 18:38:14.752085924 CET53654478.8.8.8192.168.2.5
                Jan 12, 2022 18:38:21.100702047 CET5244153192.168.2.58.8.8.8
                Jan 12, 2022 18:38:21.213359118 CET53524418.8.8.8192.168.2.5
                Jan 12, 2022 18:38:26.296413898 CET5959653192.168.2.58.8.8.8
                Jan 12, 2022 18:38:26.409181118 CET53595968.8.8.8192.168.2.5
                Jan 12, 2022 18:38:31.649983883 CET6529653192.168.2.58.8.8.8
                Jan 12, 2022 18:38:31.668584108 CET53652968.8.8.8192.168.2.5
                Jan 12, 2022 18:38:39.037731886 CET6015153192.168.2.58.8.8.8
                Jan 12, 2022 18:38:39.056185007 CET53601518.8.8.8192.168.2.5
                Jan 12, 2022 18:38:44.682404995 CET5696953192.168.2.58.8.8.8
                Jan 12, 2022 18:38:44.795475006 CET53569698.8.8.8192.168.2.5
                Jan 12, 2022 18:38:49.917918921 CET5516153192.168.2.58.8.8.8
                Jan 12, 2022 18:38:50.028428078 CET53551618.8.8.8192.168.2.5
                Jan 12, 2022 18:38:55.178416967 CET5501653192.168.2.58.8.8.8
                Jan 12, 2022 18:38:55.291503906 CET53550168.8.8.8192.168.2.5
                Jan 12, 2022 18:39:02.680068970 CET5712853192.168.2.58.8.8.8
                Jan 12, 2022 18:39:02.699554920 CET53571288.8.8.8192.168.2.5
                Jan 12, 2022 18:39:07.945353985 CET5046353192.168.2.58.8.8.8
                Jan 12, 2022 18:39:08.058603048 CET53504638.8.8.8192.168.2.5
                Jan 12, 2022 18:39:13.246021032 CET5039453192.168.2.58.8.8.8
                Jan 12, 2022 18:39:13.357094049 CET53503948.8.8.8192.168.2.5
                Jan 12, 2022 18:39:21.608736038 CET5734453192.168.2.58.8.8.8
                Jan 12, 2022 18:39:21.625154972 CET53573448.8.8.8192.168.2.5
                Jan 12, 2022 18:39:28.146733046 CET5643253192.168.2.58.8.8.8
                Jan 12, 2022 18:39:28.259862900 CET53564328.8.8.8192.168.2.5
                Jan 12, 2022 18:39:35.464998007 CET6431753192.168.2.58.8.8.8
                Jan 12, 2022 18:39:35.483736992 CET53643178.8.8.8192.168.2.5
                Jan 12, 2022 18:39:42.102267027 CET6100453192.168.2.58.8.8.8
                Jan 12, 2022 18:39:42.118866920 CET53610048.8.8.8192.168.2.5
                Jan 12, 2022 18:39:48.673012972 CET5689553192.168.2.58.8.8.8
                Jan 12, 2022 18:39:48.692035913 CET53568958.8.8.8192.168.2.5
                Jan 12, 2022 18:39:55.341304064 CET6237253192.168.2.58.8.8.8
                Jan 12, 2022 18:39:55.361430883 CET53623728.8.8.8192.168.2.5
                Jan 12, 2022 18:40:01.727452993 CET5667553192.168.2.58.8.8.8
                Jan 12, 2022 18:40:01.744152069 CET53566758.8.8.8192.168.2.5
                Jan 12, 2022 18:40:07.870163918 CET5717253192.168.2.58.8.8.8
                Jan 12, 2022 18:40:07.983393908 CET53571728.8.8.8192.168.2.5

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Jan 12, 2022 18:38:14.636555910 CET192.168.2.58.8.8.80xe10Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:21.100702047 CET192.168.2.58.8.8.80xe10fStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:26.296413898 CET192.168.2.58.8.8.80x4f81Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:31.649983883 CET192.168.2.58.8.8.80x5307Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:39.037731886 CET192.168.2.58.8.8.80xd737Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:44.682404995 CET192.168.2.58.8.8.80x9023Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:49.917918921 CET192.168.2.58.8.8.80xf926Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:38:55.178416967 CET192.168.2.58.8.8.80xb6e9Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:02.680068970 CET192.168.2.58.8.8.80x4416Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:07.945353985 CET192.168.2.58.8.8.80x6b6cStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:13.246021032 CET192.168.2.58.8.8.80x81bStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:21.608736038 CET192.168.2.58.8.8.80xb29aStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:28.146733046 CET192.168.2.58.8.8.80xdb3cStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:35.464998007 CET192.168.2.58.8.8.80x53ddStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:42.102267027 CET192.168.2.58.8.8.80x3909Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:48.673012972 CET192.168.2.58.8.8.80x3282Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:39:55.341304064 CET192.168.2.58.8.8.80x50e3Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:40:01.727452993 CET192.168.2.58.8.8.80xcb4aStandard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)
                Jan 12, 2022 18:40:07.870163918 CET192.168.2.58.8.8.80xbd93Standard query (0)girlhomejan6100.duckdns.orgA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Jan 12, 2022 18:38:14.752085924 CET8.8.8.8192.168.2.50xe10No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:21.213359118 CET8.8.8.8192.168.2.50xe10fNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:26.409181118 CET8.8.8.8192.168.2.50x4f81No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:31.668584108 CET8.8.8.8192.168.2.50x5307No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:39.056185007 CET8.8.8.8192.168.2.50xd737No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:44.795475006 CET8.8.8.8192.168.2.50x9023No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:50.028428078 CET8.8.8.8192.168.2.50xf926No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:38:55.291503906 CET8.8.8.8192.168.2.50xb6e9No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:02.699554920 CET8.8.8.8192.168.2.50x4416No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:08.058603048 CET8.8.8.8192.168.2.50x6b6cNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:13.357094049 CET8.8.8.8192.168.2.50x81bNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:21.625154972 CET8.8.8.8192.168.2.50xb29aNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:28.259862900 CET8.8.8.8192.168.2.50xdb3cNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:35.483736992 CET8.8.8.8192.168.2.50x53ddNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:42.118866920 CET8.8.8.8192.168.2.50x3909No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:48.692035913 CET8.8.8.8192.168.2.50x3282No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:39:55.361430883 CET8.8.8.8192.168.2.50x50e3No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:40:01.744152069 CET8.8.8.8192.168.2.50xcb4aNo error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
                Jan 12, 2022 18:40:07.983393908 CET8.8.8.8192.168.2.50xbd93No error (0)girlhomejan6100.duckdns.org194.5.98.28A (IP address)IN (0x0001)

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:18:38:03
                Start date:12/01/2022
                Path:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe"
                Imagebase:0x400000
                File size:635846 bytes
                MD5 hash:3BA78ED2E621B7BB47778EC2567DF223
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.249043381.00000000031A0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                Reputation:low

                General

                Start time:18:38:05
                Start date:12/01/2022
                Path:C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\039846H0INVOICERECEIPT.exe"
                Imagebase:0x400000
                File size:635846 bytes
                MD5 hash:3BA78ED2E621B7BB47778EC2567DF223
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.508293325.0000000003904000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.246308898.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.508341763.0000000003962000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.503636006.00000000024E2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.498126981.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.498719213.0000000000675000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.507080103.0000000002924000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.503483350.00000000024A0000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000000.244362493.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.507854463.0000000002A81000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.504358313.00000000028D1000.00000004.00000001.sdmp, Author: Joe Security
                Reputation:low

                General

                Start time:18:38:17
                Start date:12/01/2022
                Path:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
                Imagebase:0x400000
                File size:635846 bytes
                MD5 hash:3BA78ED2E621B7BB47778EC2567DF223
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.279178171.0000000003160000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                Antivirus matches:
                • Detection: 33%, ReversingLabs
                Reputation:low

                General

                Start time:18:38:21
                Start date:12/01/2022
                Path:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
                Imagebase:0x400000
                File size:635846 bytes
                MD5 hash:3BA78ED2E621B7BB47778EC2567DF223
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292734330.000000000277E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.275663964.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292594850.00000000022E2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292082066.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292219672.0000000000624000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292806006.0000000003771000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000001.277541562.0000000000400000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292556739.00000000022A0000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.276749512.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.292893122.00000000037AA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                Reputation:low

                General

                Start time:18:38:25
                Start date:12/01/2022
                Path:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
                Imagebase:0x400000
                File size:635846 bytes
                MD5 hash:3BA78ED2E621B7BB47778EC2567DF223
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.297921153.0000000002470000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                Reputation:low

                General

                Start time:18:38:27
                Start date:12/01/2022
                Path:C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\ngneqippkv\anlq.exe"
                Imagebase:0x400000
                File size:635846 bytes
                MD5 hash:3BA78ED2E621B7BB47778EC2567DF223
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.294082200.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.313908924.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, Author: Florian Roth
                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314341475.0000000002610000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314490678.0000000002A5E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314014470.0000000000504000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314375073.0000000002652000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000000.296175339.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314547545.0000000003A8A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.314517163.0000000003A51000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >